update
This commit is contained in:
@@ -73,10 +73,10 @@ tap.test('setup port proxy test environment', async () => {
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: 'localhost',
|
||||
port: TEST_SERVER_PORT
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -112,10 +112,10 @@ tap.test('should forward TCP connections to custom host', async () => {
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: '127.0.0.1',
|
||||
port: TEST_SERVER_PORT
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -157,10 +157,10 @@ tap.test('should forward connections to custom IP', async () => {
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: '127.0.0.1',
|
||||
port: targetServerPort
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -252,10 +252,10 @@ tap.test('should support optional source IP preservation in chained proxies', as
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: 'localhost',
|
||||
port: PROXY_PORT + 5
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -273,10 +273,10 @@ tap.test('should support optional source IP preservation in chained proxies', as
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: 'localhost',
|
||||
port: TEST_SERVER_PORT
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -311,10 +311,10 @@ tap.test('should support optional source IP preservation in chained proxies', as
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: 'localhost',
|
||||
port: PROXY_PORT + 7
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -334,10 +334,10 @@ tap.test('should support optional source IP preservation in chained proxies', as
|
||||
},
|
||||
action: {
|
||||
type: 'forward',
|
||||
target: {
|
||||
targets: [{
|
||||
host: 'localhost',
|
||||
port: TEST_SERVER_PORT
|
||||
}
|
||||
}]
|
||||
}
|
||||
}
|
||||
],
|
||||
@@ -377,10 +377,10 @@ tap.test('should use round robin for multiple target hosts in domain config', as
|
||||
},
|
||||
action: {
|
||||
type: 'forward' as const,
|
||||
target: {
|
||||
targets: [{
|
||||
host: ['hostA', 'hostB'], // Array of hosts for round-robin
|
||||
port: 80
|
||||
}
|
||||
}]
|
||||
}
|
||||
};
|
||||
|
||||
@@ -400,9 +400,9 @@ tap.test('should use round robin for multiple target hosts in domain config', as
|
||||
|
||||
// For route-based approach, the actual round-robin logic happens in connection handling
|
||||
// Just make sure our config has the expected hosts
|
||||
expect(Array.isArray(routeConfig.action.targets[0].host)).toBeTrue();
|
||||
expect(routeConfig.action.targets[0].host).toContain('hostA');
|
||||
expect(routeConfig.action.targets[0].host).toContain('hostB');
|
||||
expect(Array.isArray(routeConfig.action.targets![0].host)).toBeTrue();
|
||||
expect(routeConfig.action.targets![0].host).toContain('hostA');
|
||||
expect(routeConfig.action.targets![0].host).toContain('hostB');
|
||||
});
|
||||
|
||||
// CLEANUP: Tear down all servers and proxies
|
||||
|
Reference in New Issue
Block a user